Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

The Last Enemy: Part 2 - 2011-2023
The Last Enemy: Part 2 - 2011-2023
The Last Enemy: Part 2 - 2011-2023
Ebook200 pages3 hours

The Last Enemy: Part 2 - 2011-2023

Rating: 0 out of 5 stars

()

Read preview

About this ebook

“The last enemy to be destroyed shall be death”, wrote St. Paul in his letters. But what if someone has already managed to defeat it? Thirty-four years have gone by since an ingenious biochemist, named Louis Picard, invented the ultimate anti-aging drug in 1981, that is known as Telomerax. Louis was obliged to form a selected group of technology entrepreneurs, finance mavens, and secret service professionals to help strategically spread knowledge of the drug. The discovery of Telomerax carried obvious dangers with it, eventually leading to the collapse of society and the near-extinction of mankind, in the ruthless war that broke out. Survivors set out to design a new society, specially designed for the half-gods that individuals were becoming. An action-packed and thrilling apocalyptic novel, “The Last Enemy”, brings to light many issues that we face today, from the clash between the power of the state and the right of citizens, to respecting our limits and controlling the human drive to push ourselves beyond those very limits.

LanguageEnglish
Release dateAug 8, 2015
ISBN9781310092053
The Last Enemy: Part 2 - 2011-2023
Author

Luca Luchesini

I graduated in Telecom Networks Engineering from Politecnico di Milano in 1994 and have been working in multinational companies ever since. I started self-learning Mimetic theory in 2007 by reading all major works of Rene Girard. In 2011, I published a paper about West and Middle East relationship at the annual Girardian COV&R conference 2011 dedicated to “Order/Disorder in History and Politics”. You can reach me here: luca.luchesini@libero.it

Read more from Luca Luchesini

Related to The Last Enemy

Related ebooks

Thrillers For You

View More

Related articles

Reviews for The Last Enemy

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    The Last Enemy - Luca Luchesini

    Part 2

    2011-2023

    Luca Luchesini

    Edited by Isabel Spinelli

    Copyright 2015 by Luca Luchesini

    Disclaimer

    This is a work of fiction. Names, characters, places and incidents are either the product of the author’s imagination or are used fictitiously, and any resemblance to actual people, living or dead, business establishments, events and locations is entirely coincidental.

    Part Two

    Detection and Awareness

    Chapter 1

    Avi Eitan sat down in the computer room of Tel Aviv Ben Gurion Airport at precisely eight o'clock on October 23rd, 2010, as he had been doing for the past six months. Barely eighteen years old, he was serving his first year in the Israeli Defense Forces and, given his computer study background, he had been assigned to the team that ran the IT systems of the Israel border control.

    As he logged into the system, he thought about how dull his job was but decided it was much better than checking endless lines of passengers into the terminal building or standing with an M-16 rifle in his hands at one of the many checkpoints between Israel and the West Bank. Or even worse, at Gaza.

    The chances of having to deal with the occasional suicide bomber these days were high enough to make Ben Gurion acceptable.

    On top of that, today there were two pleasant surprises to mix up the routine.

    The first one was the arrival of new airport security members made up of some Falasha girls - Jews of Ethiopian origin. Their beauty was so stunning that even the unkept border guards could not help giving them attention.

    The second surprise was more on the professional side. Avi was asked to start testing a new image match software called ChronoPic that had just been installed by the specialists of the Shin Bet, which is the agency with counterespionage and jurisdiction inside Israeli borders.

    The origin of the software was hidden. There were rumors circulating that it was joint developed by the CIA and some experts of the web giants, but there were other claims that stated the NSA was responsible, instead.

    Avi did not really care. He clicked the new icon on his screen and started running the test. The software would collect all the pictures taken by the security cameras of the airport and search for matches to any particular subject in the photo.

    Avi ran the first test on a passenger who had left the day before, choosing one picture taken at the baggage check-in area in the main entrance. After a few seconds, the system returned a set of pictures of the man as he had gone through the security checks. He had spent some time at the coffee shop in the departure hall, loitered a bit in front of a giant chandelier at one of the gift shops, eventually bought a lousy t-shirt and hastily boarded the flight to Paris. The first test had passed.

    Avi then went through the menus and launched an extended search over the past ten days, still focused on the airport entrance. This time it took a bit longer, maybe one minute - Avi thought that from now on he should take note of the amount of time it took to search - then eventually the full set of appearances of the person popped up on the screen. And this person’s name was Pierre Malinsky, a French citizen born in 1965 who entered Israel for the first time in 1987 and whose picture records Avi now had in front of him. The software told him that Pierre regularly visited Israel, three to four times a year, and in many of them he was with a woman who was most likely his wife.

    For a second, Avi thought about whether to start an investigation on the woman or continue with Pierre. He chose to finish what he had already started, and expanded the search from the airport to the whole Shin Bet database, which basically contained footage from all the surveillance cameras of Israel.

    After exactly fourteen minutes and fifty-seven seconds, in which Avi let his thoughts drift again to the Falasha girls, the system returned the full set of images and pictures. There were thousands of them, but it was possible to sort them by time or place, to make it more manageable.

    About twenty of them (roughly one percent) were flagged with a yellow tab indicating that either the system was not sure the subject was the same or there were some discrepancies worth checking. And here was where the real work began.

    Avi started browsing through what he called the suspect set, starting from the pictures taken at sensitive locations like border checkpoints, Palestinian authority buildings, military locations, and so on.

    The conclusion was that in all cases the system had raised a false alarm. The picture quality was so poor that the software could not gather enough points to call a match and stated it as a false result. This was a function built into the software design, because the consequences of missing a real danger were far worse than stating a false one. Especially in a country like Israel.

    Before setting the system in automatic search mode, Avi went to the Morph Search menu. The software could match the picture of any given subject against an arbitrary set of creations that a malicious agent trying to enter the land of honey and milk could have adopted, such as changing the color and style of their hair, or undergoing plastic surgery, or simply playing with age.

    He ran another test on Pierre, programming the system to look for similar morphs only in the airport area. This time, the search needed ten minutes and seventeen seconds, but Avi noticed that at least at the airport the search did not report any results. He reviewed his options.

    The longer the test lasted, the less chances there were that he would be moved to another task, like for example, God forbids, at the Patriarch Tombs in Hebron to protect his ultraorthodox fellow citizens from Palestinian hate. And by that time he might have gotten to know a Falasha girl. So he selected the full morphing mode on more than one thousand members of the Shin Bet’s most wanted list and put moderate morphing to all the rest, with images going back as far as ten years.

    The system started its search, downloading the results into a special file. Avi decided to make a separate file for each image scanned. It was already twelve now, time for the lunch break. He got back to work in the late afternoon.

    ChronoPic had already created more than twenty-three files, some of which were large enough to contain hundreds of pictures. He checked if any of the files contained images of members from the most-wanted list. Seeing no results, Avi decided to go home and continue the next day.

    The following morning the number of files had grown to fifty-one. He had to start his analysis work, otherwise the backlog would become unmanageable and he did not want to lose this job.

    Many logs were inconsistencies due to poor image quality, like the case of Pierre the day before, but there were seven possible crossings with members of the most-wanted list, all under some form of morphing. He checked the dates and the identities. The most recent one had taken place two years ago, and in no case did the declared name matched the one of the suspect.

    This deserved more investigation, so he dutifully followed the Shin Bet instructions and he created a report file for each of the cases and sent it to a secure email address. On the receiving side, an officer would take care of the next level of investigation. It was quite a burdensome process, and in the meantime thirty-four new logs had been produced by ChronoPic. Avi nicknamed it ‘Crony’, considering he was going to spend a lot of time with it.

    On the evening of the second day, he was grateful that his Crony friend allowed him to spend the rest of his shift in the comfortable airport security room.

    And even better, during the afternoon coffee break he had managed to break the ice with Rachel Terwago, one of the most beautiful girls of the Falasha group.

    A few days later, he started analyzing file number 178, which was a strange one. Crony had come upon a morphing correlation between twenty-six different picture sequences, all of which were good quality as they had been taken by the airport security cameras.

    The sequences started in 2001 and finished the week before, on October 16th, 2010. The subject had flown back home on the afternoon Delta Air Lines flight to New York. The problem was, the sequences belonged to two different people. One of the first twenty was apparently George McKilroy, a US citizen. The last six instead belonged to Sean Ewals, an American as well.

    Avi scrutinized the pictures. Indeed, there was some resemblance. The morphing controller stated that George could have morphed into Sean by applying eye and nose surgery, plus some lifting, as Sean looked significantly younger. Then Avi also checked in the border control file. In both cases, there was nothing suspicious.

    Nothing to report during their stay in Israel, and nothing connecting either one to the Shin Bet database of foreign suspects.

    Avi launched a search on the whole Israel territory on both subjects. After one hour, he figured out that neither George nor Sean went near any sensitive military site. They both appeared in some parking lot and traffic light footage in the Petah Tikvah area. The hotel videos showed that they stayed at different places, while George’s pictures had been taken in the Jerusalem area, Sean always stayed in the surroundings of Tel Aviv. Looking at their customs interview reports, they both declared to be technology entrepreneurs and their whereabouts confirmed that. They were born about thirty years away from each other and this was in line with the images.

    There was still a strange resemblance flagged by the system, as if George and Sean could be the same person. But then why did Sean look so much younger than George? The opposite would have made sense.

    Avi was about to trash the log as yet another case of false results, then he remembered that his country simply could not afford false outcomes. Besides that, no one could blame him for being too cautious, so he compiled his analysis of file 178 and sent it to the Shin Bet email address.

    Chapter 2

    Eyal Podhoretz was the man in charge of the office for the analysis of internal intelligence at Shin Bet. His team was collecting and putting together information taken from all sorts of sources, from satellite imagery to words whispered in the streets of the Old City of Jerusalem, with the goal of identifying any internal threat to the Jewish State.

    This year was relatively quiet, at least in comparison to the years of the Palestinian revolts of the Intifada, but Eyal knew that peace was a concept with a much different interpretation in this part of the world. It simply meant no imminent danger and therefore more time to focus on preventing the next threat. The officer who had received the report from Avi had reached the same conclusion, something was not adding up and he had done more research.

    It turned out that George had died in 2005 and Sean’s visits had begun shortly after. They were both technology entrepreneurs. George had started in computers, then mobile phones, and then veered to biotechnology, which is where Sean started.

    However, Sean was active with a completely different set of companies.

    Eyal had sent two of his guys to politely, yet thoroughly interview the people who had done business with George in Petah Tikvah. Evidently, there were no problems whatsoever.

    According to his colleagues, he was a very creative and rich man, well connected in the business community. Politically, he seemed just like the average American, ready to side with Israel no matter what.

    Could he have been an industrial spy?

    Unlikely, as he was the one that brought the new ideas and techniques, not the other way around.

    And how about his death?

    Totally unexpected. They noted that at some point he got slightly thinner, but who knew why? Then no news for a few months, and all of the sudden the obituary popped up on the ‘San José Mercury’.

    So no one attended the funeral?

    Apparently not, it was a family-only ceremony. One of the interviewees distinctly remembered the name of George’s wife, Sheila.

    The colleagues of Sean gave very similar responses, he was very reliable, very open, and a good friend of Israel without any doubt.

    What was he working on?

    This is where the interviewees hesitated. They were stuck between the security of their home country and the business secrets of their investors. All that the team of Eyal learned was that Sean was working on breakthrough research in aging.

    To complete the puzzle, it was necessary to either interview the family of George McKilroy or catch Sean, maybe during his next trip to Israel. He sent instructions to the border agency to alert Shin Bet immediately upon his next arrival, but to let him go undisturbed. This was what had to be done in Israel.

    To get the US side of the story, he picked up the phone and called his counterpart at the Mossad.

    Yaakov Mayer answered on the fifth ring as usual, after some quick speculation on the reasons behind the call. He knew Eyal when they had served together in the same commando unit during the last Lebanese war of 2005, hunting for the missile launch sites of the Lebanese Shia party and Israel’s archenemy, Hizbollah. He knew he would not call without a solid reason.

    Hello Eyal. How can I help you?

    "Hi, Yaakov, we have a potential threat we need your help to fully assess. We are tracking a foreign suspect. We believe he has changed identity over the last few years and he is continuously entering Israel.

    He is active in biotechnology, and a regular visitor to the Petah Tikvah research area. We cannot get any more information about him from our sources and databases, so if you could just activate your network abroad.."

    Hang on, where is this guy from? Please do not tell me he is..

    Unfortunately, yes, he is American.

    Even without video link, Eyal could imagine Yaakov shaking his head in disappointment. It would have been much easier to ask the Mossad for some services in Iran or Afghanistan, as the United States were one of the hottest places to gather intelligence. Not so much for the inherent difficulty to get to your sources, but rather for the political fallout if anything went wrong.

    Eyal, let me ask you one question first: can't we just do this by simply calling someone at the FBI or Homeland Security? If we suspect this one is a bad guy, maybe he is also conspiring against the US. Our two countries tend to have common enemies, and it would save us a big embarrassment.

    "Yaakov, I thought about it and I would rather not get the FBI or HS involved, at least for now. The two guys have bulletproof identities. Their passports are one-hundred percent authentic, as well as work and residential

    Enjoying the preview?
    Page 1 of 1